This page intends to document the analysis techniques and attacks applicable to the IoT protocols supported by CatSniffer.
- Attacks on RPL and 6LoWPAN in IoT
- Selective forwarding attack
- Sinkhole attack
- Clone ID attack
- Sybil attack
- Hello flooding
- Wormhole attack
- Blackhole attack
- Denial Of Service
- Alteration and Spoofing attack
- Handler enumeration
- List properties
- Flip boolean properties
- Fuzzing handler values